Security of networked control systems subject to deception attacks: A survey
ZH Pang, LZ Fan, H Guo, Y Shi, R Chai… - … Journal of Systems …, 2022 - Taylor & Francis
A networked control system (NCS), which integrates various physical components by
utilising communication networks, is a complex intelligent control system with high flexibility …
utilising communication networks, is a complex intelligent control system with high flexibility …
Decentralized false-data injection attacks against state omniscience: Existence and security analysis
This article focuses on how false-data injection (FDI) attacks compromise state omniscience,
which needs each node in a jointly detectable sensor network to estimate the entire plant …
which needs each node in a jointly detectable sensor network to estimate the entire plant …
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review
Cyber-physical systems (CPSs) have emerged as an essential area of research in the last
decade, providing a new paradigm for the integration of computational and physical units in …
decade, providing a new paradigm for the integration of computational and physical units in …
Event-based optimal stealthy false data-injection attacks against remote state estimation systems
Security is a crucial issue for cyber–physical systems, and has become a hot topic up to
date. From the perspective of malicious attackers, this article aims to devise an efficient …
date. From the perspective of malicious attackers, this article aims to devise an efficient …
Security analysis and defense strategy of distributed filtering under false data injection attacks
This paper investigates the distributed state estimation for multi-sensor networks under false
data injection attacks. The well-known χ 2 detector is first considered for detecting the …
data injection attacks. The well-known χ 2 detector is first considered for detecting the …
Optimal stealthy integrity attacks on remote state estimation: The maximum utilization of historical data
This paper considers the problem of optimal stealthy integrity attacks on remote state
estimation. Smart sensors transmit innovations to a remote estimator through a wireless …
estimation. Smart sensors transmit innovations to a remote estimator through a wireless …
Worst-case stealthy innovation-based linear attacks on remote state estimation under Kullback–Leibler divergence
With the wide application of cyber-physical systems, stealthy attacks on remote state
estimation have attracted increasing research attention. Recently, various stealthy …
estimation have attracted increasing research attention. Recently, various stealthy …
Resilient distributed state estimation under stealthy attack
Y Lv, J Lu, Y Liu, J Lou - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Network security issues are significant for cyber-physical systems while existing wireless
networks are vulnerable to cyber-attacks. This paper proposes a novel detector for stealthy …
networks are vulnerable to cyber-attacks. This paper proposes a novel detector for stealthy …
Data-driven detection of stealth cyber-attacks in dc microgrids
Cyber-physical systems such as microgrids contain numerous attack surfaces in
communication links, sensors, and actuators forms. Manipulating the communication links …
communication links, sensors, and actuators forms. Manipulating the communication links …
Distributed fault-tolerant consensus tracking of multi-agent systems under cyber-attacks
This paper investigates the distributed fault-tolerant consensus tracking problem of
nonlinear multi-agent systems with general incipient and abrupt time-varying actuator faults …
nonlinear multi-agent systems with general incipient and abrupt time-varying actuator faults …